What you'll learn:
- Learn the concepts and perform hands on activities needed to pass the SC-900 exam
- Gain a tremendous amount of knowledge involving securing Microsoft 365 / Azure Services
- Get loads of hands on experience with securing Microsoft 365 / Azure Services
- Utilize hands on simulations that can be access anytime, anywhere!
We really hope you'll agree, this training is way more then the average course on Udemy!
Have access to the following:
Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer
Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material
Instructor led hands on and simulations to practice that can be followed even if you have little to no experience
TOPICS COVEREDINCLUDINGHANDSONLECTUREANDPRACTICETUTORIALS:
Introduction
Welcome to the course
Understanding the Microsoft Environment
Having a Solid Foundation of Active Directory Domains
Having a Solid Foundation of RAS, DMZ, and Virtualization
Having a Solid Foundation of the Microsoft Cloud Services
Questions for John Christopher
Performing hands on activities
IMPORTANT Using Assignments in the course
Creating a free Microsoft 365 Azure AD Account
Getting your free Azure credit
Describe security and compliance concepts
Describe the shared responsibility model
Describe defense in depth
Describe the Zero-Trust model
Describe encryption and hashing
Describe compliance concepts
Define identity concepts
Define identity as the primary security perimeter
Define authentication
Define authorization
Describe identity providers and the concept of Federation
Describe Active Directory
Describe the basic identity services and identity types of Azure AD
Describe Azure AD
Describe Azure AD identities including external identities
Describe hybrid identity
Describe the authentication capabilities of Azure AD
Describe the authentication methods available in Azure AD
Describe Multi-factor Authentication
Describe self-service password reset
Describe password protection and management capabilities available in Azure AD
Describe access management capabilities of Azure AD
Describe conditional access
Creating conditional access polies
Describe the benefits of Azure AD roles
Describe the benefits of Azure AD role-based access control
Describe the identity protection and governance capabilities of Azure AD
Describe identity governance in Azure AD
Describe entitlement management
Describe access reviews
Describe the capabilities of Azure AD Privileged Identity Management (PIM)
Implementing Azure AD Privileged Identity Management (PIM)
Describe Azure AD Identity Protection
Describe basic security capabilities in Azure
Visualizing general Azure networking
Describe Azure DDoS protection
Describe Azure Firewall
Describe Network Segmentation with VNet
Describe Azure Network Security groups
Create a virtual machine in Azure
Describe Azure Bastion and JIT Access
Describe ways Azure encrypts data
Describe security management capabilities of Azure
Describe Microsoft Defender for Cloud & Cloud security posture management (CSPM)
Describe the enhanced security features of Microsoft Defender for Cloud
Describe security baselines for Azure
Describe security capabilities of Microsoft Sentinel
Define the concepts of security information and event management (SIEM) and SOAR
Describe threat detection and mitigation capabilities in Microsoft Sentinel
Describe threat protection with Microsoft 365 Defender
Describe Microsoft 365 Defender services
Describe Microsoft Defender for Office 365
Describe Microsoft Defender for Endpoint
Describe Microsoft Defender for Cloud Apps
Using Microsoft Defender for Cloud Apps for policy creation
Describe Microsoft Defender for Identity
Basics of setting up Microsoft Defender for Identity
Describe the Microsoft 365 Defender portal
Describe Microsoft’s Service Trust Portal and privacy principles
Describe the offerings of the Service Trust portal
Describe Microsoft’s privacy principles
Describe the compliance management capabilities of Microsoft Purview
Describe the Microsoft Purview compliance portal
Describe compliance manager
Describe the use and benefits of compliance score
Describe information protection & data lifecycle management of Microsoft Purview
Describe data classification capabilities
Describe the benefits of content explorer and activity explorer
Describe sensitivity labels
Basics of using sensitivity labels
Describe Data Loss Prevention (DLP)
Basics of using Data Loss Prevention (DLP)
Describe Records Management
Describe Retention Polices and Retention Labels
Describe insider risk capabilities in Microsoft Purview
Describe Insider Risk Management
Describe communication compliance
Describe information barriers
Describe resource governance capabilities in Azure
Describe Azure Policy
Describe Azure Blueprints
Describe the capabilities of the Microsoft Purview governance portal
Finishing Up
Where do I go from here?